zsdc wrote:

> Chuck Fox wrote:
> >
> >> Sometimes "dumb users" can be quite creative:
> >>
> >> <a 
> >> href="http://sitefinder.verisign.com/lpc?url='%3E%3Cimg%20src=http://www.patrick.fm/boobies/boobies.php?text=VeriSign%3E";>I
> >>  Love VeriSign</a>
> >> [...]
> >
>  > No matter how foolproof you make, the fools keep getting smarter.
>  >
>  > Chuck
>
> That's not entirely true. As this examples shows, VeriSign programmers
> made a very stupid mistake causing the cross-site scripting
> vulnerability. They assumed they know how the input looks like, so
> there's no need to properly quote it before printing.
>
> Making their website show nudity may be funny but reading their users'
> cookies and personal login information might be much less funny. It
> could be easily avoided.
>
> If anything an attacker has to do in order to break their security is to
> fool any one of their users to click a link
> *.verisign.com/x=%20%22%27%3E... (or even automatically redirect anyone
> to such a link) then it is a very serious and easily expliotable
> vulnerability.
>
> Considering VeriSign's gigantic user base and the rank of information
> they manage (not to mention it's a website to which they will point any
> non-existing DNS records very soon) it's absolutely terrifying. I would
> immediately fire anyone responsible for this flaw without asking any
> question.
>
> The bottom line is: you can write a foolproof CGI script. It's not even
> very hard. Use CGI.pm with $CGI::POST_MAX (and $CGI::DISABLE_UPLOADS
> when appropriate) to get the input. Use CGI::Untaint to validate it. Use
> DBI placeholders and html-escape any printed data coming from user. Use
> the taint mode.
>
> Don't give up just because fools keep getting smarter.

Looks like they plugged the hole.  Follow the link now, and you get a search page at 
VeriSign, titled VeriSign | Try Again

Joseph


-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to